Popular among admins and adversaries alike, NetSupport Manager use has been increasingly abused over the last few years.
A legitimate remote access tool that has been in use for over 30 years, NetSupport Manager is one of the many remote monitoring and management (RMM) tools misused by adversaries. NetSupport Manager is so commonly misused that it’s frequently referred to by security researchers as a malicious remote access trojan (RAT) instead of a benign remote access tool. There are multiple reasons for this, the most significant being that a free trial version of NetSupport Manager is easily obtainable online.
While we’ve observed malicious use of NetSupport Manager since at least 2020, malicious use significantly increased over the course of 2022, a trend that continued across 2023 and into 2024. NetSupport Manager first appeared in our monthly top 10 in February 2023. After almost making the cut in 2023, NetSupport Manager made it into the rankings as our seventh most prevalent threat in 2024.
We’ve seen NetSupport Manager leveraged as both a primary payload in its own right, as well as a follow-on payload delivered by other threats in our top 10. Both Scarlet Goldfinch—which landed in third—and LummaC2—coming in sixth—used NetSupport Manager as a primary or follow-on payload.
Earlier in 2024 we saw FIN7 delivering NetSupport Manager in MSIX campaigns. Another reason for NetSupport’s placing so high this year was its use as a payload in paste-and-run campaigns. In previous years we’ve seen it delivered alongside other threats as well, like FakeSG, SocGholish, and Qbot.
Since adversaries have delivered NetSupport Manager as a part of many campaigns, initial delivery methods vary widely. Malicious NetSupport Manager can be the result of phishing campaigns, fake updates, fake CAPTCHA lures, and more.
NetSupport Manager has several components:
Legitimate NetSupport installs are often found in the Program Files
directory, using the standard filename client32.exe. Suspect instances may be found by looking for client32.exe
running from a non-standard directory, such as a user’s Downloads
or Roaming
folder.
It’s not unusual for adversaries to rename the NetSupport Manager Client file, so looking for binaries with the internal name client32
making network connections to netsupportsoftware[.]com
is another good indicator of suspicious NetSupport Manager use.
Having the ability to collect and inspect binary signature metadata and binary naming conventions and understanding common and uncommon installation paths for RMM tools like NetSupport Manager are the basic prerequisites for developing an effective detection strategy. Of course, the sheer volume of RMM tools available to adversaries, let alone abused by them, renders confident detection coverage a tall order.
The best generic advice for mitigating the risk posed by NetSupport Manager is to create robust allow/blocklist policies and strictly adhere to them.
NetSupport Manager execution is often achieved using PowerShell. The most effective protection against PowerShell tradecraft is through the implementation and enforcement of a strong Windows Defender Application Control (WDAC) policy, which places PowerShell into Constrained Language mode, mitigating a wide array of PowerShell tradecraft.
Under normal circumstances, you should expect NetSupport Manager to run from the programfiles
directory. If you find NetSupport Manager—often identifiable as client32.exe
—running outside the programfiles
directory, particularly from the programdata
directory, then it’s worth investigating. In instances where an adversary like FIN7 delivered NetSupport Manager as a follow-on payload, it is frequently observed running from a suspicious location like programdata
or a user’s directory.
process == (client32.exe)
&&
file_path_includes (programdata)
You can search your environment for the presence of unsanctioned RMM tools, including NetSupport Manager, using our open source baselining tool Surveyor.
The following Atomic Red Team tests may help you validate your coverage for behavior related to NetSupport Manager.
Get curated insights on managed detection and response (MDR) services, threat intelligence, and security operations—delivered straight to your inbox every month.